for Indiana Introduction to Computer Science — Fundamentals of Cybersecurity
Total Standards: 38Mapped: 26Completion: 68%
ICS-1.1
Create a definition of computer science and computational thinking.
ICS-1.2
Demonstrate awareness of the history of computing.
ICS-1.3
Investigate trends in computer science and their impact on society.
10.11 Impact of the Internet
ICS-1.4
Summarize ethical issues within computer science.
10.11 Impact of the Internet
ICS-2.1
Use the design process to iteratively develop a computing artifact.
21.1 Challenge Problems
ICS-2.2
Demonstrate competencies of programming constructs, including: use of data types and variables, control structures (sequencing, looping, branching), and modularity (such as a function).
4.1 Programming Concepts
4.3 Looping
4.4 Branching
4.5 Arrays and Objects
21.1 Challenge Problems
ICS-2.3
Understand how abstractions hide implementation details when used in everyday objects.
10.2 Notational Systems
11.1 Internal Components
ICS-2.4
Use abstraction to manage program complexity (such as a function to create recallable code).
4.2 Programming with Karel
4.3 Looping
ICS-2.5
Formulate algorithms using programming structures to decompose a complex problem.
4.3 Looping
21.1 Challenge Problems
ICS-2.6
Assess a program by testing to verify correct behavior.
21.1 Challenge Problems
ICS-2.7
Construct a computing artifact that has a user interface.
22.2 Logical Operators
22.3 Comparison Operators
22.4 If Statements
22.9 While Loops
22.10 Loop and a Half
ICS-2.8
Produce an artifact that includes rich media.
ICS-2.9
Illustrate knowledge of good programming practice including the use of conventional standards and comment.
ICS-3.1
Understand how computers represent data, including: text, sound, images, and numbers.
10.2 Notational Systems
10.3 Data Representation
ICS-3.2
Create data visualizations, models, and simulations.
ICS-3.3
Evaluate data to better understand the world.
ICS-3.4
Explore the relationship between information and data.
8.3 The Value of Data
ICS-4.1
Demonstrate understanding of the hardware and operating systems of computers.
7.1 Operating Systems
11.1 Internal Components
11.2 Peripheral Devices
ICS-4.2
Discuss the ethical and appropriate use of computer devices.
2.7 Hacking Ethics
10.11 Impact of the Internet
ICS-4.3
Explore the fundamental principles and components of computer networking.
10.4 Internet Hardware and Sending Information
11.3 Network Devices
ICS-4.4
Examine the impact of the Internet on society.
10.11 Impact of the Internet
ICS-4.5
Investigate the use of artificial intelligence by individuals and society.
ICS-4.6
Investigate innovations in computing, including robotics.
ICS-5.1
Design a solution to a problem by working in a team.
ICS-5.2
Explore technologies that can be used to collaborate with others of various cultures and career fields.
3.1 Project: Public Service Announcement
7.4 Software and Applications
ICS-5.3
Utilize a problem solving approach to develop a solution using technology.
12.1 Methodology
12.2 Support Practice
ICS-5.4
Analyze the work of peers and provide feedback.
ICS-5.5
Program a solution to a problem using pair programming or other methods.
ICS-6.1
Examine the dynamic between privacy and security.
2.4 Privacy & Security
ICS-6.2
Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes.
2.4 Privacy & Security
7.5 Software Licenses
7.7 Browser Configuration
ICS-6.3
Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
ICS-6.4
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
ICS-6.5
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical implications.
7.7 Browser Configuration
7.8 System Administration
9.1 Project: Security Assessment Report
11.6 Network Communication
11.7 Network Management
ICS-6.6
Discuss the laws surrounding intellectual property.
2.6 Creative Credit & Copyright
7.5 Software Licenses
10.10 Creative Credit & Copyright
ICS-7.1
Identify computer science occupations and the roles and responsibilities of each.
2.7 Hacking Ethics
8.4 Databases
8.5 Clients and Servers
8.9 Common Security Problems
ICS-7.2
Report job outlook, demand, and projected wages for computer science careers.
2.7 Hacking Ethics
8.4 Databases
8.5 Clients and Servers
8.9 Common Security Problems
ICS-7.3
Explore the job opportunities that are available in computer science.
2.7 Hacking Ethics
8.4 Databases
8.5 Clients and Servers
8.9 Common Security Problems
ICS-7.4
Investigate post-secondary training opportunities and industry certifications that are available.